Page MenuHomePhabricator

EMill-WMF (Eric Mill)
Group Product Manager, Safety and Security

Today

  • No visible events.

Tomorrow

  • No visible events.

Wednesday

  • No visible events.

User Details

User Since
Feb 4 2025, 7:48 PM (44 w, 5 d)
Availability
Available
LDAP User
Unknown
MediaWiki User
EMill-WMF [ Global Accounts ]

I lead WMF's Product Safety and Integrity team. We work on things like bot detection, temporary accounts, two-factor authentication, and overall product security and anti-abuse work.

@konklone is my older personal account, and shouldn't be tagged into things related to my WMF work.

Recent Activity

Fri, Dec 12

EMill-WMF updated the task description for T412222: Update temporary account creation rate limits.
Fri, Dec 12, 6:30 PM · Patch-For-Review, Product Safety and Integrity (Sprint Mince Pie Dec 1 - Dec 12), Temporary accounts
EMill-WMF added a comment to T411607: Security Issue Access Request for Blake.

Thanks, @Blake - this is approved from our side. @sbassett could you add @Blake?

Fri, Dec 12, 12:47 PM · SecTeam-Processed, Security-Team, Security

Mon, Dec 8

EMill-WMF added a comment to T180896: Allow functionaries to reset second factor on low-risk accounts.

If this is chosen we may still want a technical measure preventing them from remove 2FA from users with advanced right.

Mon, Dec 8, 3:54 AM · Trust-and-Safety, SecTeam-Processed, Security-Team, Security, MediaWiki-extensions-OATHAuth, WMF-Legal, MW-1.34-notes (1.34.0-wmf.1; 2019-04-16)
EMill-WMF added a comment to T368344: Proposal: fail explicitly and revoke relevant API keys over plain-text HTTP connection for all Wikimedia APIs.

Personally, I'd rather we put effort into eliminating port 80.

Mon, Dec 8, 3:35 AM · Security, MW-Interfaces-Team, Traffic, HTTPS, Wikimedia Enterprise, RESTBase-API, MediaWiki-REST-API, MediaWiki-Action-API

Sun, Dec 7

EMill-WMF added a comment to T411927: Temporary account adding URL on first Publish attempt gets hCaptcha request, but no popup..

Just flagging that we are tracking this bug - thanks for documenting it here. Our initial team discussion about it suggests this is an unintended byproduct of running enwiki in 100% passive mode, and that it will be addressed when we move to 99.9% passive mode (which is scheduled for tomorrow morning, Monday).

Sun, Dec 7, 9:16 PM · Product Safety and Integrity, WE4.2 Bot detection (WE4.2 hCaptcha editing trial), ConfirmEdit (CAPTCHA extension)

Thu, Dec 4

EMill-WMF added a comment to T411607: Security Issue Access Request for Blake.

Thanks @Clement_Goubert - could you give some more detail about the kind of security issues your work will need access to?

Thu, Dec 4, 6:19 PM · SecTeam-Processed, Security-Team, Security

Fri, Nov 28

EMill-WMF added a comment to T409718: Remove $wgCheckUserGroupRequirements and related code.

Yay for deleting code!!

Fri, Nov 28, 7:08 PM · MW-1.45-notes, MW-1.46-notes (1.46.0-wmf.5; 2025-12-02), Product Safety and Integrity (Crepes au Chocolat (Sprint Nov 10 - Nov 28)), CheckUser, MediaWiki-User-management

Mon, Nov 24

EMill-WMF added a comment to T408592: Request: Wikipedia 25 microsite hosting.

Who will be responsible for security review, when this is sharing important top level domains ?

@TheDJ Could it be possibly handled or at least initiated by me and the Reader Experience team?

I am working together with the Reader Experience team to deliver a Mediawiki extension for the same initiative, which will also requires a security review. We have been told to make an initial security review ourselves, and schedule an official review by the security team for whenever possible, as they are overloaded with review requests and have a waiting list of a couple of months.

To add on, what about the maintenance of package.json and the dependencies that it pulls in?

@BCornwall For the first 2 months after publishing the website - it will be me. After that period, I will hand over to the Reader Experience team.

Mon, Nov 24, 2:02 PM · Patch-For-Review, collaboration-services, SRE, PES1.3.3 WP25 Easter Eggs

Sat, Nov 22

EMill-WMF added a comment to T409911: hCaptcha: Submit button unresponsive after hCaptcha error.

Note that concerns have been raised about the inability of sending the form if the connection is lost after loading the edit form but before the used interacts with it (i.e. before there is a chance to load hCaptcha's SDK). This discussion is blocking merging that patch.

Sat, Nov 22, 3:37 AM · MW-1.46-notes (1.46.0-wmf.7; 2025-12-16), Product Safety and Integrity (Sprint Mince Pie Dec 1 - Dec 12), ConfirmEdit (CAPTCHA extension), WE4.2 Bot detection (WE4.2 hCaptcha editing trial)
EMill-WMF added a comment to T410386: Prompt user to create a regular account after temp account creation rate limit trip.

Switching to my volunteer Steward Liason role: We should be extra careful here before we make it happen. Assuming the rate limit between named and temporary accounts is not shared, switching to regular accounts when temporary ones are exhausted (or vice-versa) is the quickest way to bypass Six Account Limit (and make it a Twelve-Account-Limit instead). I'm not 100% sure how to account for this, but we should consider this risk and incorporate it into the decisions we make here.

CC @EMill-WMF @Tchanders, as I'm fairly certain enwiki would consider this extra risk for their usage as well (that said, I'm not an enwiki user, so...).

Hope this makes sense!

Sat, Nov 22, 3:31 AM · Temporary accounts, Product Safety and Integrity, Growth-Team
EMill-WMF added a comment to T408025: Make RecoveryCodeCountPresentationModel useful again.

I do think both is the correct answer - I posted in https://phabricator.wikimedia.org/T406281 with some thoughts there.

Sat, Nov 22, 3:22 AM · FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

To be clear, I don't mean implementing all of those things as part of this ticket. I mean that I assume that it might make sense to create a post-login point that checks a variety of conditions that might trigger an interstitial, so that it's pretty straightforward to add those other sorts of examples going forward.

Sat, Nov 22, 3:22 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

This functionality is likely only necessary under the single recovery code model which, as has been noted, is not the current configuration within Wikimedia production and likely never will be again.

Sat, Nov 22, 3:20 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)
EMill-WMF moved T409259: Security Issue Access Request for Peter from Our Part Is Done to In Progress on the Security-Team board.
Sat, Nov 22, 12:22 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF reopened T409259: Security Issue Access Request for Peter as "Open".
Sat, Nov 22, 12:22 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T409259: Security Issue Access Request for Peter.

@Peter Could you put some more rationale on the ticket here, about why work related to IP blocking of Beta cluster involves needing access to security tickets on phabricator?

Sat, Nov 22, 12:19 AM · SecTeam-Processed, Security-Team, Security

Sun, Nov 16

EMill-WMF added a comment to T402089: Make LoginNotify cookie expiry longer than login cookie expiry (with "remember me").

Yes, this change makes sense to me from a product and user safety perspective.

Sun, Nov 16, 7:18 PM · Community-Tech, Security, MediaWiki-extensions-LoginNotify

Nov 13 2025

EMill-WMF added a comment to T408011: Design Research: Prompt user to create a regular account after temp account creation rate limit trip.

Good points on the accordion - I was not thinking at all about other languages. I defer to what you think best. Among the above visual proposals, I like the accordion version, and the rightmost version (the smallest text) the most.

Nov 13 2025, 10:04 PM · Growth-Team (FY2025-26 Q2 Sprint 3), Essential-Work, Design, Temporary accounts, Product Safety and Integrity

Nov 12 2025

EMill-WMF added a comment to T408011: Design Research: Prompt user to create a regular account after temp account creation rate limit trip.

For the message, I would remove the "Why do I need an account?" subheader and expander/collapser, and say something in active voice. (Also, we don't like to say "anonymous editing", as registering a user account is, if anything, more privacy-protective.)

Nov 12 2025, 8:19 PM · Growth-Team (FY2025-26 Q2 Sprint 3), Essential-Work, Design, Temporary accounts, Product Safety and Integrity

Oct 31 2025

EMill-WMF added a comment to T408930: Inform privileged users that they are required to have 2FA on the main Special:AccountSecurity page.

I think this would also be an opportunity to have a UWER-focused message to add as many options/passkeys as possible.

Oct 31 2025, 5:18 PM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Oct 27 2025

EMill-WMF added a comment to T408383: False positives of lost access to wiki account ("You need to verify your login").

@Taylor As I said in my reply on https://www.mediawiki.org/wiki/Project:Support_desk/Archive_23#Obligatory_security_rules_that_users_cannot_decide - we do understand that email checks add real imposition for users who routinely clear cookies and change IPs. To clear up some things I think you may not understand about the two options I described there (keeping a cookie, and 2FA):

Oct 27 2025, 2:37 PM · Product Safety and Integrity, Trust-and-Safety, Security

Oct 23 2025

EMill-WMF added a comment to T101017: Early security release access for Lcawte (ShoutWiki).

Just FYI (and likely many years beyond relevance at this point), but we now have #acl_release_security_pre_announce, which is used to subscribe trusted mediawiki operators to high/critical MediaWiki bugs prior to their release. Folks can request to be added to this group (via a new, Security-Team -tagged Phabricator task) and they will then be vetted by the Product Safety and Integrity team.

Oct 23 2025, 4:04 AM · SecTeam-Processed, ShoutWiki, WMF-Legal
EMill-WMF closed T407666: Early access request for wiki.gg to pre-announce security fixes as Declined.

To follow up, and with apologies for the conflicting comments in the two tasks, the policy is as I described above - the group is not open for applications, and has no guarantees associated with it. I'll add a comment to the other task to clarify there as well.

Oct 23 2025, 3:59 AM · SecTeam-Processed, Security, Security-Team

Oct 22 2025

EMill-WMF added a comment to T241921: Fix Wikimedia captchas.

To note here, hCaptcha is now running in production for Special:CreateAccount on English Wikipedia, test2wiki, and several other production wikis. We encourage folks on this thread interested in improving accessibility to try it out. For example, we'd be interested in hearing what the screen reader experience is like. test2wiki is likely the most appropriate place for testing that actually creates new accounts.

Oct 22 2025, 8:21 PM · WE4.2 Bot detection, Security, Security-Team, Stewards-and-global-tools, ConfirmEdit (CAPTCHA extension), UX-Debt, Accessibility, Epic
EMill-WMF added a comment to T6845: CAPTCHA doesn't work for people with visual impairments.

To note here, hCaptcha is now running in production for Special:CreateAccount on English Wikipedia, test2wiki, and several other production wikis. We encourage folks on this thread interested in improving accessibility to try it out. For example, we'd be interested in hearing what the screen reader experience is like. test2wiki is likely the most appropriate place for testing that actually creates new accounts.

Oct 22 2025, 8:21 PM · SecTeam-Processed, ConfirmEdit (CAPTCHA extension), Accessibility, Design, WCAG-Level-A
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

Just to mention here as well - https://phabricator.wikimedia.org/T407167 is resolved, since we have reverted back to 10 user codes. The goal had been to simplify the recovery code experience, and we relaxed the reauth timer to go along with these changes to reduce lockout risk, but this just wasn't a good enough solution. We'll be more cautious before adjusting this again.

Oct 22 2025, 2:06 PM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Oct 21 2025

EMill-WMF added a comment to T407859: Add limit to number of 2FA devices.

We had briefly discussed this last quarter, and I had suggested 100. That's still my suggestion - something impractical for normal usage to reach, but still a normal system operations cap.

Oct 21 2025, 2:25 PM · MW-1.46-notes (1.46.0-wmf.2; 2025-11-12), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T407666: Early access request for wiki.gg to pre-announce security fixes.

@RheingoldRiver I am sorry to give you a disappointing answer here, but the acl*release_security_pre_announce group is not open for applications.

For the record, I feel like the point should be made that this seems to conflict with what was said in T101017#11285755 a few days ago (my emphasis added):

Just FYI (and likely many years beyond relevance at this point), but we now have #acl_release_security_pre_announce, which is used to subscribe trusted mediawiki operators to high/critical MediaWiki bugs prior to their release. Folks can request to be added to this group (via a new, Security-Team -tagged Phabricator task) and they will then be vetted by the Product Safety and Integrity team.

Oct 21 2025, 11:19 AM · SecTeam-Processed, Security, Security-Team
EMill-WMF closed T407666: Early access request for wiki.gg to pre-announce security fixes as Declined.

@RheingoldRiver I am sorry to give you a disappointing answer here, but the acl*release_security_pre_announce group is not open for applications. It is extremely small, rarely used (just once so far), and invite-only. It does not have any SLAs/SLOs -- we make no promises around it, and it may or may not ever become a formal process. We could make this more clear in the description for the group, so we will do that to avoid mismanaging expectations.

Oct 21 2025, 2:20 AM · SecTeam-Processed, Security, Security-Team

Oct 9 2025

EMill-WMF added a comment to T406619: Security Issue Access Request for SLong-WMF (Sean Long).

@sbassett Yep.

Oct 9 2025, 2:10 AM · SecTeam-Processed, Security-Team, Security

Oct 6 2025

EMill-WMF updated subscribers of T405926: Security Issue Access Request for Jsn.sherman.

@sbassett Thanks - I spoke with @Samwalton9-WMF (who we recently granted access to), and confirmed that @jsn.sherman is the tech lead for that project and has a similar need for access as Sam does. Thumbs up from me.

Oct 6 2025, 3:14 PM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

are we suggesting to show this message to everyone? or for instance, if a person has already 1/2/... 2FA methods does it make sense to give them this advise?

I think it does, yes. You could have 15 2FA methods set up, but if you logged in with a recovery code, that probably means you don't have access to any of them. That might be OK because that lack of access might be temporary (e.g. you left your security key at home), which is why we shouldn't be extremely aggressive about it, but we should still encourage them to set up a new factor because that's the surest way for them to avoid locking themselves out.

among those ideas, my suggestion would go for 3 to sequence the communication.

With #3 I worry that people will miss it, especially on desktop where it's relatively small compared to the rest of the UI. I think toast notifications are good for success/confirmation messages where it's OK if the user doesn't see them, but for this I would prefer something more prominent like #1c or #2 (but with a warning message instead of an info message, and without the dismiss icon).

i've also included other type of communications like the "copied to clipboard" confirmation. if we find it too intrusive we could also consider using the cdx-tooltip instead of a cdx-message.

I think the copied confirmation is fine as you've designed it.

Oct 6 2025, 12:41 PM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Oct 3 2025

EMill-WMF added a comment to T406281: Display new recovery code after user logs in with recovery code.

I like this. @AAlhazwani-WMF or @KColeman-WMF what do you think?

Oct 3 2025, 3:04 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support)

Sep 30 2025

EMill-WMF updated EMill-WMF.
Sep 30 2025, 11:47 PM

Sep 25 2025

EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

Yes, I can see the dashboards I was intending to now! Thank you very much for everyone who helped resolve my issue, and apologies for my difficulty understanding some of the finer points around our access management.

Sep 25 2025, 4:58 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 20 2025

EMill-WMF moved T404903: Grant Access to analytics-privatedata-users for ericmill from Awaiting User Input to Backlog on the LDAP-Access-Requests board.
Sep 20 2025, 6:57 PM · SRE-Access-Requests, Data-Engineering, SRE
EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

The docs say membership in wmf should be enough to log into superset. Can you not log into it?

Or can you log into it but this request is specifically about seeing more private data including PII ?

Sep 20 2025, 6:57 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 18 2025

EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

@Aklapper This: https://www.mediawiki.org/wiki/Product_Analytics/Superset_Access#Requesting_access Specifically, the this Phabricator form link.

Sep 18 2025, 8:39 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 17 2025

EMill-WMF added a comment to T404903: Grant Access to analytics-privatedata-users for ericmill.

I am not actually certain if I have shell access or not. My account at https://idm.wikimedia.org says my shell username is ericmill, but I don't recall specifically requesting shell access.

Sep 17 2025, 6:56 PM · SRE-Access-Requests, Data-Engineering, SRE
EMill-WMF created T404903: Grant Access to analytics-privatedata-users for ericmill.
Sep 17 2025, 6:55 PM · SRE-Access-Requests, Data-Engineering, SRE

Sep 9 2025

EMill-WMF added a comment to T403683: Rename 2FA methods to friendlier names.

This is part of an initiative to make our on-wiki 2FA system more accessible and useful for a broader, less technical audience than is currently able/required to use 2FA today. As part of that, we're trying to remove as much technical nomenclature (including protocol names) from the copy and UX of the site. The users who would recognize the terms TOTP and WebAuthn are also the least likely to need help with this in the first place, so I think we should proceed with Authenticator app and Security key.

Sep 9 2025, 2:48 AM · MW-1.45-notes (1.45.0-wmf.20; 2025-09-23), MediaWiki-extensions-OATHAuth, FY2025-26 WE4.6.2 Multiple Authenticators
EMill-WMF added a comment to T403921: Re-enable WMF-NDA access for Siko_WMDE.

That initiative was just about 2FA access, not retroactively re-evaluating anything else, so I think we should proceed and re-enable.

Sep 9 2025, 2:28 AM · SecTeam-Processed, Security, Security-Team

Sep 5 2025

EMill-WMF added a comment to T362715: Move credentials change to central domain.

@EMill-WMF will decide that based on T401742.

Sep 5 2025, 7:46 PM · MW-1.45-notes (1.45.0-wmf.25; 2025-10-28), MW-1.44-notes (1.44.0-wmf.27; 2025-04-29), Patch-For-Review, SUL3, MediaWiki-extensions-OATHAuth, MediaWiki-Core-AuthManager, MediaWiki-extensions-CentralAuth, MediaWiki-Platform-Team
EMill-WMF added a comment to T403829: hCaptcha: Self-host secure-api.js code.

To be clear, the main goal here is to remove the risk of unexpected changes (including compromise) of the part of the JavaScript that necessarily has access to the parent document context before establishing the iframes that the rest of the code is then loaded into.

Sep 5 2025, 2:37 PM · ConfirmEdit (CAPTCHA extension)
EMill-WMF added a comment to T401772: Allow TOTP auth methods to be named.

Would it makes sense to pre-fill this with something generic ("authenticator app") for the user's first TOTP key, to reduce friction? (The names will eventually be editable, right?) Or make it clearly optional?

Sep 5 2025, 1:47 PM · MW-1.46-notes (1.46.0-wmf.1; 2025-11-05), Product Safety and Integrity (Sprint Mint Choc Chip Ice Cream (Oct 20 - Nov 7)), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T403683: Rename 2FA methods to friendlier names.

Security key

This term can instead mean any 2FA token regardless of type. Also it is too similar to "security code" proposed in T159915: Remove the word "CAPTCHA" from all Wikimedia user interface strings (though I oppose the latter task).

Sep 5 2025, 1:26 PM · MW-1.45-notes (1.45.0-wmf.20; 2025-09-23), MediaWiki-extensions-OATHAuth, FY2025-26 WE4.6.2 Multiple Authenticators

Aug 26 2025

EMill-WMF added a comment to T22326: Option to strip some metadata on upload (GPS/geolocation privacy).

Let's focus conversation on the most technically reasonable way to reflect a user's choice to remove lat/long (and other data extracted from the EXIF) at upload time from the form, and reflect those choices in the EXIF data of the resulting publicly available image.

Aug 26 2025, 3:38 AM · UploadWizard, Privacy, Multimedia, MediaWiki-Uploading

Aug 23 2025

EMill-WMF closed T401179: Security Issue Access Request for Sadiya.Mohammed_WMDE as Declined.

@karapayneWMDE Just being a developer on a significant project isn't enough to grant full security issue access, which cuts much wider than any one project. (To be clear, this is the position we're maintaining for WMF as well.) If you're experiencing issues in your work, feel free to reach out separately to discuss it.

Aug 23 2025, 7:05 PM · SecTeam-Processed

Aug 14 2025

EMill-WMF added a comment to T401775: Allow 2FA methods to be renamed.

This is clearly nice, though I think it would be bearable for this feature to show up post-launch if we needed to descope something.

Aug 14 2025, 2:41 AM · Product Safety and Integrity (Sprint Mince Pie Dec 1 - Dec 12), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), MediaWiki-extensions-OATHAuth
EMill-WMF added a comment to T401773: Always redirect 2FA management special page to auth domain on SUL wikis, so that WebAuthn setup can be offered.

What about (in addition) redirecting https://en.wikipedia.org/wiki/Special:Manage_Two-factor_authentication (and other non-auth domain URLs to this same page on other wikis) to the auth domain version of it at https://auth.wikimedia.org/wiki/Special:Manage_Two-factor_authentication ?

Aug 14 2025, 2:38 AM · MW-1.45-notes (1.45.0-wmf.21; 2025-09-30), FY2025-26 WE 4.6 - Account Security (WE 4.6.4 - 2FA improvements and passkey support), FY2025-26 WE4.6.2 Multiple Authenticators, MediaWiki-extensions-OATHAuth

Aug 13 2025

EMill-WMF closed T401008: Security Issue Access Request for zoe as Declined.
Aug 13 2025, 1:28 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T401008: Security Issue Access Request for zoe.

If that's the threshold I think I probably don't meet it. I can keep being manually added to tickets on a need-to-know basis.

Aug 13 2025, 1:28 AM · SecTeam-Processed, Security-Team, Security

Aug 8 2025

EMill-WMF updated subscribers of T401132: Security Issue Access Request for Samwalton9-WMF.

From the Security side, we're good to go on this - @Samwalton9 leads product development on moderator tools that a heavy overlap with security and privacy efforts.

Aug 8 2025, 9:50 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T401262: Security Issue Access Request for MMoss_WMF.

From the Security side, we're good to go on this - @MMoss_WMF works closely with us on security and privacy issues and may need access to tickets on a regular basis to support their work.

Aug 8 2025, 9:49 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T401179: Security Issue Access Request for Sadiya.Mohammed_WMDE.

We'll also need significantly more context to support approval than is present on this ticket. Please include a more detailed rationale (while remembering that this is a public ticket).

Aug 8 2025, 9:26 AM · SecTeam-Processed
EMill-WMF added a comment to T401008: Security Issue Access Request for zoe.

Before this can be approved, I would like some more context on this ticket to support the request. What security ticket was fielded? Why do we think it will be so recurring that manual adding will be a big hassle?

Aug 8 2025, 9:23 AM · SecTeam-Processed, Security-Team, Security
EMill-WMF added a comment to T399648: Default to WebAuthn when available during login 2FA check.

I believe we should always prioritize WebAuthn. If a user has a phishing-resistant option registered, we should be encouraging them to use it -- and also making it more noticeable if they actually do end up at a phishing site (which will not be able to offer a working WebAuthn UI). This will be especially important for users with extended rights and WMF staff that may be targeted for phishing. We can make it pretty easy for the user to select to use an alternative method to log in. I'm open to user feedback, and/or seeing it show up in analytics that users are switching to alternative methods more than we might expect and which seems high-friction, but I think we should start from a posture of WebAuthn-first.

Aug 8 2025, 9:14 AM · MediaWiki-extensions-OATHAuth, FY2025-26 WE4.6.2 Multiple Authenticators

Jul 29 2025

EMill-WMF added a watcher for FY2025-26 WE4.6.2 Multiple Authenticators: EMill-WMF.
Jul 29 2025, 3:51 AM
EMill-WMF added a comment to T399664: Expand 2FA Opt-In Privileges.

Affected users should somehow be awared that they can enable 2FA.

Jul 29 2025, 3:49 AM · User-notice-archive, MW-1.46-notes (1.46.0-wmf.7; 2025-12-16), MediaWiki-extensions-OATHAuth, FY2025-26 WE4.6.3 Global 2FA Opt-In

Jun 25 2025

EMill-WMF added a watcher for WE4.2 Bot detection (WE4.2 hCaptcha account creation trial): EMill-WMF.
Jun 25 2025, 2:52 AM

Jun 23 2025

EMill-WMF added a comment to T368224: Audit members of acl*security for more than 12 months of no activity (May 2025).

Thank you, @Jly !

Jun 23 2025, 4:44 PM · SecTeam-Processed, Security, Security-Team, Phabricator

Jun 12 2025

EMill-WMF added a comment to T395661: UserInfoCard: Indicate if a user has enabled the preference to view temporary account IPs.

+1 as well - good solution.

Jun 12 2025, 9:26 PM · OKR-Work, Trust and Safety Product Sprint (Sprint Cannoli (July 7 - July 25)), MW-1.45-notes (1.45.0-wmf.9; 2025-07-08), CheckUser-UserInfoCard, Trust and Safety Product Team, CheckUser, WE4.2 Anti-abuse

Jun 9 2025

EMill-WMF added a comment to T396155: Improve verification email.

i'd say that reviewing both the copy nor the design of those (echo) notification emails is out-of-scope for this task.

Agreed. I think simple improvements (like the parent task that stalled out in 2019) often go unaddressed because we get caught up in the broader scope of the full project and all the related enhancements we might eventually want to pursue.
I suggest we take a lightweight, agile approach here: let’s focus on making some quick copy improvements and measure their effect. This allows us to make meaningful progress without getting stalled by the larger, more complex set of changes that we may not have capacity to tackle right away.

Jun 9 2025, 8:30 PM · Growth-Team, Epic, MW-1.46-notes (1.46.0-wmf.4; 2025-11-25), User-notice, MediaWiki-Email, GrowthExperiments
EMill-WMF added a comment to T368224: Audit members of acl*security for more than 12 months of no activity (May 2025).

I've posted the results in P76908, and we will proceed with the removals sometime this week

Jun 9 2025, 5:42 PM · SecTeam-Processed, Security, Security-Team, Phabricator

Jun 6 2025

EMill-WMF added a comment to T58074: Echo: Generate periodic web notification to nudge users to confirm an unverified email address.

Have we considered providing an Special:InvalidateEmail link in the email?

I suggest it because if the email used is not associated with the account, then I'm not sure how someone would opt-out of the emails without logging in to the account or confirming the email address. Confirming the email is the opposite of what they want to do and managing email preferences is impossible without knowing the account password.

The MediaWiki-extensions-CentralAuth extension used such a link for emails generated by sendConfirmAndMigrateEmail.php.

As such, I would strongly recommend providing this link in the email version to avoid a situation where an LTA could repeatedly send emails to a user they want to annoy by creating loads of accounts that have the email address of the user they want to annoy.

Jun 6 2025, 1:28 PM · User-notice-archive, MW-1.45-notes (1.45.0-wmf.24; 2025-10-21), Product Safety and Integrity (Sprint Mint Choc Chip Ice Cream (Oct 20 - Nov 7)), Essential-Work, Data-Persistence (work done), Patch-For-Review, Performance Issue, SecTeam-Processed, Security-Team, Growth-Team, Notifications (Echo)
EMill-WMF added a comment to T396155: Improve verification email.
  1. Should we pursue implementation of BIMI (Brand Indicators for Message Identification), and if so, what are the technical and policy requirements?

I only have glanced at the requirements, but it seems it will require some changes to our DNS records or something? This will definitely involve more teams, not sure which exactly. Traffic? serviceops? SRE? Figuring out the correct team and talking to them will be part of answering this question.

Jun 6 2025, 1:21 PM · Growth-Team, Epic, MW-1.46-notes (1.46.0-wmf.4; 2025-11-25), User-notice, MediaWiki-Email, GrowthExperiments

May 28 2025

EMill-WMF added a comment to T395216: [Request] Research into suspicious account behaviors.

It would good to see if there are precise criteria that we could identify and use to separate accounts into tiers of how likely/known they are to be good-faith accounts. Ideally we would get enough confidence to handle those accounts programmatically differently during authentication, recovery, moderation, and other functions in the wikis.

May 28 2025, 3:18 PM · Product-Analytics, WE4.2 Anti-abuse, Trust and Safety Product Team
EMill-WMF added a comment to T220057: Encourage users to confirm their email is still active.

I think a notification similar to T58074: Echo: Generate periodic web notification to nudge users to confirm an unverified email address would be helpful. Alternatively, we could do something like GitHub does, where after login you're taken to an interstitial page to review your details and mark them as confirmed.

May 28 2025, 2:30 PM · MediaWiki-User-management

May 27 2025

EMill-WMF added a comment to T58074: Echo: Generate periodic web notification to nudge users to confirm an unverified email address.

I think something got lost in the shuffle here - the first bullet is implying they might get locked out during EmailAuth (which is only true for accounts with emails that remain unconfirmed), but where we started is saying that if they lose account access, we cannot recover them (which is true for both email-less accounts and accounts with unconfirmed emails. The first bullet implies that the user won't be able to login from an unrecognized device or location as a matter of policy unless they have a confirmed email, but that is not our policy.

May 27 2025, 1:25 AM · User-notice-archive, MW-1.45-notes (1.45.0-wmf.24; 2025-10-21), Product Safety and Integrity (Sprint Mint Choc Chip Ice Cream (Oct 20 - Nov 7)), Essential-Work, Data-Persistence (work done), Patch-For-Review, Performance Issue, SecTeam-Processed, Security-Team, Growth-Team, Notifications (Echo)

May 26 2025

EMill-WMF updated the task description for T395216: [Request] Research into suspicious account behaviors.
May 26 2025, 6:29 PM · Product-Analytics, WE4.2 Anti-abuse, Trust and Safety Product Team
EMill-WMF added a comment to T390780: Mask mailaddress during login that triggers EmailAuth.

@EMill-WMF - So just to confirm, did you want to mask all domains, or is there a list of popular domains you'd prefer to leave unmasked? The former is the simpler solution, but if there's a list of popular domains you'd like to leave unmasked, can you confirm that list here? @Tgr had suggested some options in T390780#10712923.

May 26 2025, 5:35 PM · MW-1.45-notes (1.45.0-wmf.9; 2025-07-08), MW-1.44-notes (1.44.0-wmf.22; 2025-03-25), Security, Privacy, MediaWiki-extensions-EmailAuth

May 22 2025

EMill-WMF added a comment to T150898: Force OATHAuth (2FA) for certain user groups in Wikimedia production and Beta wikis.

This needs messaging to the communities before it's made live.

For the record, it seems like individual CU/OS were not notified directly despite the change being in effect.

May 22 2025, 2:11 PM · User-notice, Sustainability (Incident Followup), Security, Stewards-and-global-tools, Wikimedia-Site-requests, MediaWiki-User-login-and-signup

May 16 2025

EMill-WMF added a comment to T390780: Mask mailaddress during login that triggers EmailAuth.

@EMill-WMF could you please let us know if you think the domain needs to also be masked? The proposed patch only masks the local part of the email address.

May 16 2025, 6:08 PM · MW-1.45-notes (1.45.0-wmf.9; 2025-07-08), MW-1.44-notes (1.44.0-wmf.22; 2025-03-25), Security, Privacy, MediaWiki-extensions-EmailAuth
EMill-WMF added a comment to T58074: Echo: Generate periodic web notification to nudge users to confirm an unverified email address.

Someone may register with a valid email owned by someone else, and it would be spammy to send those notifications periodically without a way to opt-out from them.

May 16 2025, 4:16 PM · User-notice-archive, MW-1.45-notes (1.45.0-wmf.24; 2025-10-21), Product Safety and Integrity (Sprint Mint Choc Chip Ice Cream (Oct 20 - Nov 7)), Essential-Work, Data-Persistence (work done), Patch-For-Review, Performance Issue, SecTeam-Processed, Security-Team, Growth-Team, Notifications (Echo)

May 15 2025

EMill-WMF added a comment to T365525: Application Security Review Request : CommunityRequests Extension.

@sbassett is it possible to prioritize and / or escalate the CommunityRequests Extension security review?

May 15 2025, 5:28 PM · MediaWiki-extensions-CommunityRequests, Community-Tech, secscrum, Security, Application Security Reviews

May 13 2025

EMill-WMF added a comment to T393615: Impose technical restrictions on granting the `temporary-account-viewer` group.

FWIW, it'd be great if whatever you come up with here is usable for T391699: Add functionality to disallow bureaucrats who do not have 2fa enabled to grant certain privileged rights/groups as well :-)

The problem with that is that it's almost entirely useless as described. An attacker can take over a bureaucrat account, set up 2FA, and then grant interface-admin - it is barely a slowdown.

It's far from perfect security, but this was also viewed as a way to nudge a significant number of bureaucrats into setting up 2fa for their accounts. At least that was one of my hopes.

May 13 2025, 2:41 PM · MW-1.45-notes (1.45.0-wmf.4; 2025-06-03), Trust and Safety Product Sprint (Sprint Carrot Cake (May 26 - June 13)), Patch-For-Review, CheckUser, MediaWiki-User-management, Trust and Safety Product Team, Temporary accounts (Major pilot wiki deployment)

Apr 28 2025

EMill-WMF added a watcher for Security: EMill-WMF.
Apr 28 2025, 2:15 AM

Feb 5 2025

EMill-WMF added a comment to T385643: Grant Eric Mill (EMill-WMF) Phabricator security access.

I've enabled MFA.

Feb 5 2025, 7:38 PM · SecTeam-Processed, Security, Security-Team

Feb 4 2025

EMill-WMF added a watcher for Trust-and-Safety: EMill-WMF.
Feb 4 2025, 10:28 PM